FixVibe
Research notehigh

UnrealIRCd SASL Certificate Fingerprint Spoofing Authentication Bypass (CVE-2016-7144)

A vulnerability in the SASL authentication module of UnrealIRCd allows remote attackers to spoof TLS certificate fingerprints. By sending a crafted AUTHENTICATE parameter, an attacker can bypass authentication and log in as another user.

CVE-2016-7144CWE-287

Attacker Impact

An unauthenticated remote attacker can bypass authentication and log in as any registered user or administrator on the IRC network [S1]. By spoofing the TLS certificate fingerprint of a target user, the attacker gains unauthorized access to private channels and administrative privileges [S1].

Root Cause

The vulnerability exists in the SASL authentication module of UnrealIRCd [S1]. Due to insufficient validation of the parameters passed during SASL authentication, the application incorrectly trusts a user-supplied certificate fingerprint rather than verifying it against the actual TLS session data [S1]. This allows an attacker to supply a crafted parameter containing the target user's certificate fingerprint, leading to successful authentication bypass [S1].

Affected Versions

This vulnerability affects the following versions of UnrealIRCd:

  • UnrealIRCd versions prior to 3.2.10.7 [S1]
  • UnrealIRCd 4.x versions prior to 4.0.6 [S1]

Concrete Fixes

  • Upgrade UnrealIRCd: Update the UnrealIRCd server to version 3.2.10.7, 4.0.6, or any later release where the SASL module has been patched to properly validate certificate fingerprints against the active TLS connection [S1].